Jump to content
snakeO2

Oracle WebCenter Sites Satellite Server - HTTP Header Injection

Recommended Posts

SEC Consult Vulnerability Lab Security Advisory < 20130417-2 >

=======================================================================

title: HTTP header injection/Cache poisoning in Oracle WebCenter

Sites Satellite Server

product: Oracle WebCenter Sites Satellite Server (former FatWire

Satellite Server)

vulnerable version: 7.6.0 Patch1, 7.6.2, 11.1.1.6.0, 11.1.1.6.1

fixed version: Patch information see sections below

CVE: CVE-2013-1509

impact: medium

homepage: Oracle and FatWire

found: 2012-09-17

by: K. Gudinavicius

SEC Consult Vulnerability Lab

https://www.sec-consult.com

=======================================================================

Vendor description:

-------------------

FatWire Satellite Server is a predecessor product of Oracle WebCenter Sites

Satellite Server.

"Oracle WebCenter Sites Satellite Server enables organizations to deliver

segmented, targeted, and dynamically assembled content across global Web

properties with rapid response times and intelligent edge caching to optimize

and speed the delivery of dynamic Web experiences."

Source: http://www.oracle.com/us/products/middleware/webcenter/satellite-server/overview/index.html

Vulnerability overview/description:

-----------------------------------

Due to unsanitized user input it is possible to inject arbitrary HTTP header

values in certain HTTP responses of the Satellite Server. This can be

exploited, for example, to perform session fixation and malicious redirection

attacks via the Set-Cookie and the Refresh headers. Moreover, the Satellite

Server caches these HTTP responses with the injected HTTP header resulting in

all further requests to the same resource being served with the poisoned HTTP

response, while these objects remain in cache.

Proof of concept:
-----------------
An arbitrary header can be injected in the HTTP responses of the
downloadable resources. The values of the blobheadername2 and the
blobheadervalue2 URL parameters are user controllable. In the following
example the Refresh header is injected:

http://fatwire/cs/Satellite?blobcol=urldata&blobheadername1=content-type&blobheadername2=Refresh&
blobheadervalue1=application/pdf&blobheadervalue2=0;url=http://www.sec-consult.com&blobkey=id&
blobnocache=false&blobtable=MungoBlobs&blobwhere=1342534304149&ssbinary=true&site=S08

The returned HTTP response will contain the injected Refresh header and its
value. Furthermore, the HTTP response will be cached, so the next time users
will be accessing the same downloadable resource using the standard URL, they
will be affected and redirected using the injected Refresh header value.

HTTP/1.1 200 OK
Date: Thu, 06 Sep 2012 15:59:04 GMT
Refresh: 0;url=http://www.sec-consult.com
Last-Modified: Thu, 06 Sep 2012 15:54:20 GMT
Content-Type: application/pdf
Connection: close
Content-Length: 772193

Vulnerable / tested versions:

-----------------------------

The following installation has been tested:

* FatWire Satellite Server 7.6.0 Patch1.

Vendor contact timeline:

------------------------

2012-11-26: Contacting vendor through secalert_us@oracle.com

2012-11-26: Vendor response, will investigate issues

2012-11-27: Investigation ongoing, the following ID assigned:

S0321206 - ARBITRARY HTTP HEADER INJECTION/CACHE POISONING IN FATWIRE

2013-01-25: S0321206 Issue fixed in main codeline, scheduled for a future CPU

2013-04-12: S0321206 is fixed in upcoming CPU on 2013-04-16

2013-04-16: Oracle releases April 2013 CPU

2013-04-17: Public release of SEC Consult advisory

Solution:

---------

Apply latest patches, see:

Oracle Critical Patch Update - April 2013

Workaround:

-----------

Advisory URL:

-------------

https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm

Sursa: Oracle WebCenter Sites Satellite Server - HTTP Header Injection

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...